Wireshark Filter Examples

ip.addr == 172.16.1.1
This filters for any packet with 172.16.1.1, as either the source or destination.

ip.addr==172.16.1.1 && ip.addr==172.16.1.2
This creates a conversation filter between the two defined IP addresses.

tcp.flags.reset==1
This filter will find and display all TCP resets.

tcp.port==5000
This creates a filter for any TCP packet with 5000 as a source or destination port.

tcp contains test
This filter will find and display all TCP packets that contain the word ‘test’. Very helpful when searching on a specific string or user ID, for example.

!(arp or icmp or dns)
This filter will mask out arp, icmp, or dns protocols. This is a great way to remove protocols from the view that are not involved with troubleshooting thus allowing you to focus on the traffic that may be the problem.

tcp.analysis.retransmission
This filter will display all retransmissions in the trace. This is helpful when tracking down slow application performance and packet loss.

icmp or dns
This creates a filter to display all icmp and dns packets in the trace.

http.request
This filter will find and display all HTTP GET requests.

udp contains 03:28:58
This filter will find the HEX values of 0x03 0x28 0x58 at any offset in the packet trace.

not (ip.addr==176.31.239.201 or ip.addr==192.168.0.1 or ip.addr==10.10.10.10)
This filter removes the IP addresses listed from the packet capture